dlopen() catch

Trivia for today:

Q: What happens if you dlopen() for a library that has already landed in the process space thanks to being dynamically linked with the process considered?

A: Obvious, stupid! The library will load in, overwriting already initialized library-specific variables and making massive waves of doom and destruction. What’s worse, if your current life’s feature set comes with a really bad karma, the library that gets loaded may even come from a different location than the one you linked with, causing ultimate ragnarok and software demise.

Reference counters? lol!

Leave a Reply

Your email address will not be published. Required fields are marked *